Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

The Week In Ransomware – December 18th 2020 – Targeting Israel

The Week In Ransomware – December 18th 2020 – Targeting Israel

The SolarWinds supply chain attack has dominated this week’s cybersecurity news, but there was still plenty of ransomware news this week.

Over the past month, Israel has been targeted in a series of cyberattacks that are attributed to Iran. This week, the Pay2Key ransomware actors targeted on another Israel company in an attack on Intel’s Habana Labs. This group appears to be focused on causing havoc for Israeli interests rather than generating a ransom payment.

We also saw a threat actor capitalizing on Cyberpunk 2077’s release by distributing ransomware disguised as the game.

Other than that, it has been mostly new variants of existing ransomware released this week.

Contributors and those who provided new ransomware information and stories this week include: @Seifreed@FourOctets@malwareforme@jorntvdw@VK_Intel@malwrhunterteam@BleepinComputer@LawrenceAbrams@DanielGallagher@Ionut_Ilascu@demonslay335@serghei@struppigel@fwosar@PolarToffee@GelosSnake@sh1shk0va@ClearskySec@ProferoSec@OhadMZ@Sophos@thepacketrat@JakubKroustek@siri_urz@BeazleyGroup@darb0ng@Kangxiaopao, and @RakeshKrish12.

December 13th 2020

Intel’s Habana Labs hacked by Pay2Key ransomware, data stolen

​Intel-owned AI processor developer Habana Labs has suffered a cyberattack where data was stolen and leaked by threat actors.

New Conti variant

S!ri found a new Conti variant that appends the .KCWTT extension to encrypted files.

December 14th 2020

New Ouroboros ransomware variant

S!ri found a new variant of the Ouroboros ransomware that appends the .Sophos extension.

Also Read: The Scope Of Singapore Privacy: How We Use It In A Right Way


New Zeoticus variant

MalwareHunterTeam found a new Zeoticus 2.0 ransomware variant that appends the .2020END extension. Guess they are fed up with this year also.

New STOP Ransomware variant

Michael Gillespie found a new STOP Ransomware variant that appends the .booa extension.

Hacker legen Symrise lahm – warum der Fall besonders schwerwiegend ist

Clop sample used on Symrise

Minhee Lee found the Clop ransomware variant used in the Symrise attack.

December 15th 2020

Ransomware attack causing billing delays for Missouri city

The City of Independence, Missouri, suffered a ransomware attack last week that continues to disrupt the city’s services.

New Dharma ransomware variants

Jakub Kroustek found two new Dharma Ransomware variants that append the .msf or .lock extensions.

New STOP Ransomware variant

Michael Gillespie found a new Phobos variant that appends the “.id[].[ICQ_Sophos].Antivirus” extension.

December 16th 2020

Ransomware gangs automate payload delivery with SystemBC malware

SystemBC, a commodity malware sold on underground marketplaces, is being used by ransomware-as-a-service (RaaS) operations to hide malicious traffic and automate ransomware payload delivery on the networks of compromised victims.

Beazley Breach Insights – Q3 2020

In an incredibly challenging year in which ransomware has easily become the biggest cyber threat to impact individuals and organizations alike, the severity of ransomware attacks has continued to escalate. During 2020, these incidents have reached new levels of complexity, having developed a long way from the early incarnations of ransomware designed to trick an employee into clicking on a bad email that then encrypts a workstation and file shares.

New Hades Ransomware

Michael Gillespie found a new ransomware calling itself Hades Ransomware that appends a random extension and drops ransom note named “HOW-TO-DECRYPT-xxxxx.txt.”

Also Read: Deemed Consent PDPA: How Do Businesses Comply?


New HiddenTear variant

MalwareHunterTeam found a HiddenTear variant that appends the .fmfgmfgm extension.

The COVID-20 Ransomware

MalwareHunterTeam found a silly bootlocker named COVID-20 ransomware.

December 17th 2020

Iranian nation-state hackers linked to Pay2Key ransomware

Iranian-backed hacking group Fox Kitten has been linked to the Pay2Key ransomware operation that has recently started targeting organizations from Israel and Brazil.

Ransomware masquerades as mobile version of Cyberpunk 2077

A threat actor is distributing fake Windows and Android installers for the Cyberpunk 2077 game that is installing a ransomware calling itself CoderWare.


December 18th 2020

New STOP Ransomware variant

Michael Gillespie found a new STOP Ransomware variant that appends the .omfl extension.

New Hakbit variant

xiaopao found a new Hakbit variant that appends the .rastar extension.

New Inferno RaaS

RAKESH KRISHNAN found a new ransomware-as-a-service called Inferno that is recruiting affiliates.

Inferno RaaS

That’s it for this week! Hope everyone has a nice weekend!



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us